Insider sabotage, not ransomware: how a Kansas City engineer used a hidden VM to lock admins out of 3,538 Windows systems
Between Nov 9 and Nov 25, 2023, Daniel Rhyne — a 57‑year‑old core infrastructure engineer — used legitimate administrator privileges and a hidden virtual machine on his company laptop to change passwords and schedule shutdowns that locked IT staff out of 254 Windows servers and 3,284 workstations. This was an insider sabotage operation that looked very different in mechanics from a typical external ransomware campaign.
Timeline and legal aftermath
Investigators say Rhyne had unauthorized access from Nov 9–25, 2023; on Nov 25 he triggered mass password resets and notifications, then emailed a ransom demand claiming backups were erased and servers would be shut down daily unless paid. Scheduled tasks set during the intrusion were intended to run in December and further disrupt operations.
Federal authorities arrested Rhyne in Kansas City, Missouri, on Aug 27, 2024. He faces charges including extortion, intentional damage to protected computers, and wire fraud — penalties that can total up to 35 years in prison and $750,000 in fines under the current indictment.
How the attack was executed from inside
Forensic work shows Rhyne ran a hidden virtual machine on his company‑issued laptop to research and execute command‑line techniques without obvious traces in his primary environment. Investigators point to web searches for deleting domain accounts, clearing Windows logs, and remotely changing local administrator passwords, plus security camera footage and access logs, as evidence tying him to the activity.
| Action or asset | Count / detail |
|---|---|
| Domain administrator accounts with password changes | 13 accounts |
| Domain user accounts with password changes | 301 accounts |
| Windows servers affected | 254 servers |
| Workstations affected | 3,284 workstations |
| Distinctive linking artifact | Password used across changes: “TheFr0zenCrew!” |
Why this was not a typical external ransomware incident
This case contrasts with external ransomware in three concrete ways: the actor used valid, high‑privilege credentials rather than deploying third‑party malware; the attacker relied on built‑in Windows capabilities (scheduled tasks, account administration) instead of a noisy encryption routine; and the activity was performed from inside the corporate network on a company machine. Those differences reduce many common external detection signals — for example, no unusual outbound command‑and‑control traffic or widespread file‑encryption patterns — while increasing the impact of privilege misuse.
That internal vector also changes responsibility and mitigation thresholds for defenders. Where perimeter controls focus on blocking outside access, preventing an administrator from weaponizing their account requires governance controls (least privilege, multi‑person approval for destructive scripts), continuous logging of admin actions, and endpoint visibility that can detect nested virtual machines or suspicious command‑line sequences on host devices.
Detection checkpoints and quick response guidance
Practical checkpoints that would have helped detect or limit the incident include: alerting on bulk changes to privileged passwords or group membership; monitoring scheduled task creation across domain controllers; flagging unusual use of virtualization on managed endpoints; and correlating administrative web searches with elevated account activity. In this case, web search history and camera logs were pivotal evidence — showing that simple endpoint telemetry and physical access correlation remain valuable.
Short FAQ
How soon can a company spot this pattern? — If you log privileged account changes and scheduled‑task creation, you can detect mass password resets in near real‑time; without that telemetry it can be days to weeks, as seen with the Nov 9–25 window here.
What’s the immediate containment step? — Revoke or isolate the compromised admin accounts, use out‑of‑band admin recovery procedures, and snapshot domain controllers before remedial changes to preserve forensic evidence.
Which longer‑term control matters most? — Enforce credential separation (separate admin workstations), multifactor and just‑in‑time privilege elevation, and endpoint monitoring capable of detecting hidden or nested VMs and unusual command‑line activity.

